DanielVF

Secure smart contracts.

My primary focus is leading the ongoing develoment of secure smart contracts, from architecture, process, team training, and personal code review. I've worked in web3 since 2017, and smart contract security since the fall of 2020.

Code I have signed off on has *never* had a loss of user funds bug found by a hacker, auditor, or bounty program.

-> Secured the development of Prime Eth from 0 to $35+ million TLV.

-> Secured the development of OETH from 0 to $200+ million TLV.

-> Secured the development of OUSD from 0 to $380+ million TLV.

Community

-> On SEAL 911 with samczsun. Am a member of the Security Alliance

-> Led or assisted incident response war rooms for 10+ protocols

-> #1 place team at the 2023 EthCC Wargames

Best of Tweets

I'm most known for my security focused tweets, and tear downs of how hacks actually worked. I tweet from @DanielVF. You should follow.

-> Curve Oracle Bug Found

-> Playtpus Reverse Hack

-> Bytecode exuction visualization

-> Inverse finance hack visualization

-> How signature malability attacks work

-> Audius hack

Selected Talks

Upcoming: Incident Response Lessons from Human Spaceflight
FilCon Security, Brussels

Upcoming: How the CertiK hack on Kraken Worked
DeFi Security Summit Series

Safe Upgrades, The Most Dangerous Game
DeFi Security Summit 2023, Paris

Understanding hacks - Unchained | Blockchain Security Conference 2022

Securing smart contracts - Blockchain Security Series 2024